Last Updated on June 14, 2021 by Admin

Networking Essentials (Version 2) – Modules 13 – 16: Home Network Basics Pre-Test Exam Answers Full 100% 2021

  1. Which two statements characterize wireless network security? (Choose two.)

    • Wireless networks offer the same security features as wired networks offer.
    • Wireless guest mode provides open access to a protected LAN.
    • With SSID broadcast disabled, an attacker must know the SSID to connect.
    • Using the default IP address on an access point makes hacking easier.
    • An attacker needs physical access to at least one network device to launch an attack.
      Answers Explanation & Hints:

      The default settings on a wireless network usually include an SSID that is being broadcast as well as default IP address settings. These default settings are considered insecure because with them an attacker can easily see a wireless network and attempt to connect to it and make changes to the network.

  2. Which type of network technology is used for low-speed communication between peripheral devices?

    • Bluetooth
    • Ethernet
    • 802.11
    • channels
      Answers Explanation & Hints:

      Bluetooth is a wireless technology that uses the 2.4 GHz frequency to connect peripheral devices over a short-range, low-speed connection.

  3. What two radio frequency bands are used in home Wireless LANs? (Choose two.)

    • 9 MHz
    • 2.4 GHz
    • 5 GHz
    • 5 MHz
    • 900 GHz
      Answers Explanation & Hints:

      The wireless technologies most frequently used in home networks are in the unlicensed 2.4 GHz and 5 GHz frequency ranges.

  4. Which type of wireless communication is based on 802.11 standards?

    • Wi-Fi
    • Cellular WAN
    • Bluetooth
    • Infrared
      Answers Explanation & Hints:

      The IEEE 802.11 standards define Wi-Fi wireless LAN specifications.

  5. Which DSL technology provides higher downstream bandwidth to the user than upstream bandwidth?

    • ADSL
    • SDSL
    • CDMA
    • TDMA
      Answers Explanation & Hints:

      ADSL provides higher downstream bandwidth to the user than upload bandwidth. SDSL provides the same capacity in both directions. TDMA and CDMA are not DSL technologies.

  6. What would a technician require in order to install a hypervisor on a client machine?

    • an SSD
    • multiple storage drives
    • a server housed by a cloud service provider
    • virtualization software
      Answers Explanation & Hints:

      A hypervisor is used to create a virtual machine (VM). The hypervisor can be part of an operating system such as Windows Hyper-V or it can be downloaded from a virtualization vendor such as VMWare or Oracle.

  7. Which statement describes a characteristic of cloud computing?

    • A business can connect directly to the Internet without the use of an ISP.
    • Applications can be accessed over the Internet through a subscription.
    • Devices can connect to the Internet through existing electrical wiring.
    • Investment in new infrastructure is required in order to access the cloud.
      Answers Explanation & Hints:

      Cloud computing allows users to access applications, back up and store files, and perform tasks without needing additional software or servers. Cloud users access resources through subscription-based or pay-per-use services, in real time, using nothing more than a web browser.

  8. What technology enables a cell phone to be used as a hands-free device?

    • Wi-Fi
    • Bluetooth
    • 4G
    • Yosemite
      Answers Explanation & Hints:

      Bluetooth provides a way to connect wireless devices, such as headsets, to a nearby mobile device. Wi-Fi and 4G provide WAN access to voice and data. Yosemite is the code name applied to a recent version of Apple OS X.

  9. What is the primary means for mitigating virus and Trojan horse attacks?

    • antivirus software
    • encryption
    • antisniffer software
    • blocking ICMP echo and echo-replies
      Answers Explanation & Hints:

      Antivirus software is the primary means of mitigating both virus and Trojan horse attacks. By using up-to-date antivirus software, the spread of viruses and Trojan horse attacks can be reduced.

  10. What type of program installs and gathers personal information, including password and account information, from a computer without permission or knowledge of the user?

    • adware
    • pop-ups
    • spyware
    • pop-unders
      Answers Explanation & Hints:

      An unauthorized program that gathers personal information from a computer is known as spyware.

  11. What type of attack is the ping of death?

    • brute force
    • virus
    • social engineering
    • denial of service
      Answers Explanation & Hints:

      The ping death is a denial of service attack and involves sending IP packets that are too large to a target device with the goal of disrupting the function of the device so that its services are denied to users.

  12. What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

    • phishing
    • vishing
    • backdoor
    • Trojan
      Answers Explanation & Hints:

      Phishing is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware.

  13. Which wireless access point association parameter is used by the wireless client to distinguish between multiple wireless networks in the same vicinity?

    • password
    • network mode
    • SSID
    • channel setting
      Answers Explanation & Hints:

      Wireless access points are used to bridge traffic between wireless devices and other devices on the network. A wireless device uses the SSID association parameters to distinguish between multiple wireless networks. The SSID uniquely identifies a wireless LAN and is broadcast by most wireless access points.

  14. What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

    • MAC filtering
    • software firewall
    • proxy server
    • WPA encryption
      Answers Explanation & Hints:

      Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network. A software firewall is used to prevent other users from gaining access to the protected computer. Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network. A proxy server is mostly used to filter traffic based on content.

  15. A network administrator has decided to use WPA2 for security in a WLAN. Which statement describes WPA2?

    • WPA2 uses preconfigured keys to encrypt and decrypt data.
    • WPA2 specifies the use of a dynamic encryption key.
    • WPA2 requires use of an open authentication method.
    • WPA2 specifies the use of a static encryption key that must be changed frequently to enhance security.
      Answers Explanation & Hints:

      WPA2, unlike WEP which uses preconfigured keys, generates new, dynamic keys each time a client establishes a connection with the AP.

  16. What is the purpose of a DMZ?

    • It analyzes traffic for intrusion attempts and sends reports to management stations.
    • It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
    • It provides secure connectivity for clients that connect to the internal network through a wireless LAN.
    • It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
      Answers Explanation & Hints:

      The DMZ is an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network. It allows external hosts to access internal servers.

5 4 votes
Article Rating
Subscribe
Notify of
guest
2 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments